Question No: 11

What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS sessions and HTTPS access?

sslconfig

sslciphers

tlsconifg

certconfig

Answer: A

Question No: 12

When it is configured in accordance to Cisco best practices, the switchport port-security maximum command can mitigate which two types of Layer 2 attacks? (Choose two.)

rogue DHCP servers

ARP attacks

DHCP starvation

MAC spoofing

CAM attacks

IP spoofing

Answer: C,E

Question No: 13

How many bridge groups are supported on a firewall that operate in transparent mode?

8

16

10

6

Answer: A

Question No: 14

Which statement about traffic storm control behavior is true?

Traffic storm control cannot determine if the packet is unicast or broadcast.

If you enable broadcast and multicast traffic storm control and the combined broadcast and multicast trafficexceeds the level within a 1 second traffic storm interval, storm control drops all broadcast and multicast traffic until the end of the storm interval

Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet isunicast or broadcast.

Traffic storm control monitors incoming traffic levels over a 10 second traffic storm control interval

Answer: B

Question No: 15

Which statement about the Cisco Security Manager 4.4 NAT Rediscovery feature is true?

It provides NAT policies to existing clients that connect from a new switch port.